CVE-2007-3104 – Null pointer to an inode in a dentry can cause an oops in sysfs_readdir
https://notcve.org/view.php?id=CVE-2007-3104
The sysfs_readdir function in the Linux kernel 2.6, as used in Red Hat Enterprise Linux (RHEL) 4.5 and other distributions, allows users to cause a denial of service (kernel OOPS) by dereferencing a null pointer to an inode in a dentry. La función sysfs_readdir en el kernel de Linux versión 2.6, tal y como es usada en Red Hat Enterprise Linux (RHEL) versión 4.5 y otras distribuciones, permite a usuarios causar una denegación de servicio (OOPS del kernel) desreferenciando un puntero null para un inodo en un dentry. • http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=242558 http://lists.opensuse.org/opensuse-security-announce/2007-12/msg00001.html http://osvdb.org/37115 http://rhn.redhat.com/errata/RHSA-2007-0488.html http://secunia.com/advisories/25771 http://secunia.com/advisories/25838 http://secunia.com/advisories/26289 http://secunia.com/advisories/26643 http://secunia.com/advisories/26651 http://secunia.com/advisories/27912 http://secunia.com/advisories/28033 http://secunia.c • CWE-399: Resource Management Errors •
CVE-2007-0771 – Tracing execution of a threaded executable causes kernel BUG report
https://notcve.org/view.php?id=CVE-2007-0771
The utrace support in Linux kernel 2.6.18, and other versions, allows local users to cause a denial of service (system hang) related to "MT exec + utrace_attach spin failure mode," as demonstrated by ptrace-thrash.c. El soporte utrace en el kernel de Linux versión 2.6.18 y otras versiones, permite a usuarios locales causar una denegación de servicio (bloqueo de sistema) relacionado con el "MT exec + utrace_attach spin failure mode," como es demostrado por el archivo ptrace-thrash.c. • http://osvdb.org/35927 http://secunia.com/advisories/25080 http://securitytracker.com/id?1017979 http://www.redhat.com/support/errata/RHSA-2007-0169.html http://www.securityfocus.com/bid/23720 https://bugzilla.redhat.com/show_bug.cgi?id=227952 https://bugzilla.redhat.com/show_bug.cgi?id=228816 https://exchange.xforce.ibmcloud.com/vulnerabilities/34128 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9447 https://access.redhat.com/security/cve/ •
CVE-2006-5753 – kernel listxattr syscall can corrupt user space programs
https://notcve.org/view.php?id=CVE-2006-5753
Unspecified vulnerability in the listxattr system call in Linux kernel, when a "bad inode" is present, allows local users to cause a denial of service (data corruption) and possibly gain privileges via unknown vectors. Vulnerabilidad no especificada en la llamada al sistema listxattr del núcleo de Linux, cuando un "inode malo" (bad inode) está presente, permite a usuarios locales provocar una denegación de servicio (corrupción de datos) y posiblemente obtener privilegios mediante vectores no especificados. • http://fedoranews.org/cms/node/2739 http://fedoranews.org/cms/node/2740 http://lkml.org/lkml/2007/1/3/150 http://osvdb.org/33020 http://secunia.com/advisories/23955 http://secunia.com/advisories/23997 http://secunia.com/advisories/24098 http://secunia.com/advisories/24100 http://secunia.com/advisories/24206 http://secunia.com/advisories/24400 http://secunia.com/advisories/24429 http://secunia.com/advisories/24482 http://secunia.com/advisories/24547 http: • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •
CVE-2006-5701 – Linux Kernel 2.6.x - SquashFS Double-Free Denial of Service
https://notcve.org/view.php?id=CVE-2006-5701
Double free vulnerability in squashfs module in the Linux kernel 2.6.x, as used in Fedora Core 5 and possibly other distributions, allows local users to cause a denial of service by mounting a crafted squashfs filesystem. Vulnerabilidad doble-libre en módulo squashfs en el kernel de Linux 2.6.x, tal y como se usa en Fedora Core 5 y posiblemente otras distribuciones, permite a un usuario local provocar denegación de servicio a través del montado manipualado del sistema de ficheros. • https://www.exploit-db.com/exploits/28895 http://projects.info-pull.com/mokb/MOKB-02-11-2006.html http://secunia.com/advisories/22655 http://secunia.com/advisories/23361 http://secunia.com/advisories/23384 http://secunia.com/advisories/24259 http://www.mandriva.com/security/advisories?name=MDKSA-2007:047 http://www.securityfocus.com/bid/20870 http://www.ubuntu.com/usn/usn-395-1 https://exchange.xforce.ibmcloud.com/vulnerabilities/29967 •
CVE-2006-4997
https://notcve.org/view.php?id=CVE-2006-4997
The clip_mkip function in net/atm/clip.c of the ATM subsystem in Linux kernel allows remote attackers to cause a denial of service (panic) via unknown vectors that cause the ATM subsystem to access the memory of socket buffers after they are freed (freed pointer dereference). La función clip_mkip en net/atm/clip.c del subsistema ATM en el núcleo Linux permite a atacantes remotos provocar una denegación de servicio (panico) mediante vectores no identificados que provocan que el subsisstema ATM acceda a la memoria de búferes de sockets después de que hayan sido liberados (referencia a puntero liberado). • http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=206265 http://secunia.com/advisories/22253 http://secunia.com/advisories/22279 http://secunia.com/advisories/22292 http://secunia.com/advisories/22497 http://secunia.com/advisories/22762 http://secunia.com/advisories/22945 http://secunia.com/advisories/23064 http://secunia.com/advisories/23370 http://secunia.com/advisories/23384 http://secunia.com/advisories/23395 http://secunia.com/advisories/23474 http://secunia.com/ • CWE-416: Use After Free •